Fortinet's annual Security Census 2015 reports that APJ CISOs faced major vulnerabilities in 2015 via unsecured wireless networks. Experts advise on protection methods for wireless networks.
Phishing campaigns are becoming harder to mitigate because of an uptick in spoofed websites tied to top-level domains, such as .bank, says Dave Jevans of the Anti-Phishing Working Group.
Kaspersky Lab has discovered a new, advanced persistent threat - inside its own networks. Dubbed Duqu 2.0, the malware has ties to Stuxnet, and was used to target Iranian nuclear negotiations, researchers say.
NASSCOM and DSCI have launched a cybersecurity task force to help develop India as a global R&D hub. Experts question whether the sponsoring organizations have set the right agenda for this new entity.
Another large hacker attack has been revealed in the healthcare sector. But unlike three recent big cyber-attacks, which targeted health insurers, this latest breach hit a healthcare provider organization. Experts weigh in on mitigation steps.
Dick Williams, CEO of digital security firm Webroot, says the cybersecurity profession needs more than just technical experts. Learn why he says firms will seek out those who can understand the behaviors of cyber-attackers.
The Reserve Bank of India plans to set up an IT subsidiary to help banks strengthen cybersecurity. Banking and security leaders say this is a positive move toward responding to cybercrime trends.
The use of century-old laws and the lack of a data protection regime is hurting India's ability to combat cyberfraud, says independent adviser Nandkumar Saravade. What immediate steps must be taken?
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
Automating the process of excising personally identifiable information when sharing data is a challenge that the Defense Advanced Research Projects Agency hopes to overcome. DARPA will spend up to $60 million to fund projects to address the problem.
The IT security industry must do a much better job of persuading young people with the requisite math and science skills to join the cybersecurity workforce rather than choose another profession, says David Shearer of (ISC)².
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the banking industry's greatest wire fraud worries. These schemes threaten to overshadow what the industry previously saw from commercial account takeover incidents.
In...
As organizations increasingly focus on securing critical data, they mustn't overlook one huge vulnerability: enterprise email. Steven Malone of Mimecast discusses the latest in unified email management.
The House on April 23 passed a second cyberthreat information sharing bill, the National Cybersecurity Protection Advancement Act. Now it will be combined with the previously approved Protecting Cyber Networks Act before it's sent to the Senate.
How badly does the president want Congress to enact cyberthreat information-sharing legislation? Despite concerns over provisions of two bills, the White House isn't threatening vetoes as it did in previous congresses when raising similar objections.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.